Study of symmetry in Constraint Satisfaction Problems? Belaid Benhamou. URA CNRS Universite de Provence,

Size: px
Start display at page:

Download "Study of symmetry in Constraint Satisfaction Problems? Belaid Benhamou. URA CNRS Universite de Provence,"

Transcription

1 Study of symmetry in Constraint Satisfaction Problems? Belaid Benhamou URA CNRS Universite de Provence,,Place Victor Hugo - F11 Marseille cedex, France phone number : Benhamou@gyptis.univ-mrs.fr Abstract. Constraint satisfaction problems (CSP's) involve nding values for variables subject to constraints on which combinations of values are permitted. Symmetrical values of a CSP variable are in a sense redundant. Their removal will simplify the problem space. In this paper we give the principle of symmetry and show that the concept of interchangeability introduced by Freuder, is a particular case of symmetry. Some symmetries can be computed eciently thanks to the structure of the problem (neighborhood interchangeability is a kind of these symmetries). Therefore we show how such symmetries can be used by existing constraint propagation algorithms and introduce a backtrack procedure exploiting symmetries. Both theoritical analysis and expiriments indicate that our proposed approach is an improvment of neighborhood interchangeability use, and has very good behavior for pigeon-hole problems. 1 Introduction The nite domain constraint satisfaction problem (CSP) 2 is well known in Articial Intelligence. It has been investigated in the 2 Through out this paper, we use CSP to refer to the nite domain constraint satisfaction problem. past by a number of researchers in dierent contexts; and steal a well-studied research area of recent years (refer to Kumar [1]). A CSP involves, (1) a (nite) set V = fv 1 ; v 2 ;... ; v n g of variables, (2) a - nite set D = fd 1 ; D 2 ;... ; D n g of discret domain values in which D i is the nite discrete domain associated whith the variable v i ; to avoid confusions between values of dierent domains, d i will denote the fact that it belonges to the domain D i, () a nite set C = fc 1 ; c 2 ;... ; c n g of constraints, a k-ary constraint c i is dened on a subset V k V of variables which we denote var(c i ), (4) and a nite set R = fr 1 ; R 2 ;... ; R n g of relations corresponding to the constants in C, R i represents the list of tuples form in which the tuples of values satisfying the constraint c i are enumerated. Thus, a CSP can be seen as a quadriplet P(V; D; C; R). A value assignment is a mapping which species a value for each variable: formally a value assignment I can be seen as: I : V! [ i2[1;n]d i such that I[v i ] 2 D i, 8i 2 [1; n]. A value assignment satises a constraint if it gives a combination of values to variables that is permitted by the constraint; otherwise it falsies it. Thus a constraint satisfaction problem is the task of nding one or all value assignments for the constraints network such that all the constraints are satised together. As beeing expected, various techniques for solving CSP's have been developed; these include backtraking, arc consistancy (Waltz [1], Mackworth [11]), path consistan-

2 cy (Freuder [6] On other hand, symmetries for boolean constraints are well studied in (Benhamou and Sais [2,]). They showed that it is a real improvment for eciency of several automated deduction algorithms. In this paper we develop the concept of symmetry for CSP's. Symmetrical domain values will be in a sense redundant. Their removal will simplify the problem search space. On other hand the set of solution of a CSP can be represented in a more compact way using symmetry. Indeed only non-symmetrical solutions are computed (basical solutions) from which we process the other solutions whitout duplication of eorts. The paper is organized as following : Two levels of semantic symmetry are de- ned in Section 2. Section discusses syntactical symmetry which is a form of semantic symmetry that can be computed eciently using only the structure of the considered problem. In other words, syntactical symmetry is considered as a susient condition to hold semantic symmetry (Neighborhood interchangeability (Freuder [7]) is a case of syntactical symmetry). Section 4 explains how symmetrical values can be used in various algorithms such as propagation methods and propose a backtrack procedure taking advantage of symmetrical values. In section 5 we evaluate the proposed techniques by experimental results. Section 6 concludes the work. For simplicity we studie binary CSP's, which involve only constraints between two variables. However, symmetry remains available for non-binary CSP's; and non-binary CSP's can be transformed into binary ones (Rossi, Dhar and Petri [12]). 2 Semantic symmetry We are interested by two problems in CSP's : the problem of nding a solution (test of satisability) and the problem of ndind all the solutions of the CSP. Thus two levels of semantic symmetry are dined whith respect to the two previous problems. Denition 1 Symmetry for satisability. Two domain values b i and c i for a CSP variable v i 2 V are symmetrical for satisability (notation b i c i ) i the following assertions are equivalent : 1. There is a solution of the CSP which contains the value b i ; 2. There is a solution of the CSP which contains the value c i. Domain values can be not only symmetrical for satisability (denition 1) but symmetrical for the set of all solutions as well. Thus, if sol(p) denotes the set of solutions of the CSP P, then we dene a second level of semantic symmetry as follow : Denition 2 Symmetry for all solutions. Two domain values b i and c i for a CSP variable v i 2 V are symmetrical for sol(p) (notation b i ' c i ) if and only if each solution of the CSP containing the value b i can be mapped into a solution containing the value c i and viceversa. Remark. Symmetrical values for all solutions (denition 2) are also symmetrical values for satisability (denition 1). Example 1 Graph coloring problem. The problem consists in coloring the vertices so that no two vertices which are joined by an edge have the same color. The available colors (domain values) at each vertex are shown (gure 1). The red 1 and white 1 colors for vertex v 1 are two symmetrical domain values. Indeed, solutions in which one of them participates, can

3 be obtained from the solutions in which the other value appears by permuting the values red and white for the variables v 1, v 2 and v. sucient condition to hold semantic symmetry (denition 2) and give an ecient method for search of such symmetries. v1 red, white c1 Syntactical symmetry marroon, red, white v Identiying semantic symmetries as dined in c12 c4 (denitions 1 and 2) is straightforward time consoming, as this requires solving the problem. This section studies a family of symmetries (syntactical symmetries) which are v2 blue, red, white blue v4 c24 more tractable computationally, thanks to the structures of the considered problem. Fig. 1. The graph coloring problem. A permutation of domain values of a binary CSP P = (V; D; C; R) can be seen In other hand, Freuder introduced in ([7]) as: : [ i2[1;n]d i! [ i2[1;n]d i, such that (d i ) 2 D i, 8i 2 [1; n] and 8d i 2 D i. The the notion of interchangeability, where two domain values are interchangeable in some en- fv; D; Cg of the CSP P. However, it induces permutation have no inuence on the sets veronment, if they can be substituted for each a permutation t on the tuples in each relation other without any eects to the environment. R ij 2 R and then a permutation R on the Let us summarize the main denition. relations themselves. Therefore a syntactical symmetry of a CSP P = (V; D; C; R) is a permutation of domain values which leaves the CSP P invariant (i.e. R (R i ) = R i ; 8R i 2 R). Formally: Denition. Two domain values b i and c i for a CSP variable v i 2 V are fully interchangeable i (1) every solution to the CSP which contains b i remains a solution when c i is substituted for b i, (2) every solution to the C- SP which contains c i remains a solution when b i is substituted for c i. Remark. Interchangeable values are particular symmetrical values for all solutions in which the mapping consists to permute the interchangeable values and still identity for the other values. In the previous examples, values red 1 and white 1 are not interchangeable. Thus, the principle of symmetry seems to be more general than the notion of interchangeability. Therefore, eliminating symmetrical values can prune more great deal of eort from a backtrack search tree if such values are processed eciently. We study in the next section syntactical symmetry of domain values which is a Denition 4 Syntactical symmetry. A permutation is a syntactical symmetry of the CSP P = (V; D; C; R) i [8R ij 2 R, d i ; d j 2 tuples(r ij ) ) (d i ); (d j ) 2 tuples(r ij )]. Remark. A syntactical symmetry of a CSP is a domain value permutation such that R (R i ) = R i, 8R i 2 R. Example 2 Pigeon-hole problem. The problem consists in putting n pigeons in n1 holes such that each hole holds at most one pigeon. Take for instance 4 pigeons and holes. The pigeons are represented by the set of variables the holes by the domain values, as it was shown Both t resp. R are natural generalizations for to tuples resp. relations.

4 in the constraint graph of gure 2, the constraint c 1 is given in its microstructure form showing the permitted tuples in the relation R 1. v2 c12 a b c24 c14 v1 a b c J@ L@ AS JJ LL@@ AA SS v4 c2 a b c S JJ SS c4 c1 c b a Fig. 2. Pigeon-hole problem for 4 pigeons and holes. The permutation dened as: (a i ) = (b i ), (b i ) = (c i ), (c i ) = (a i ), 8i 2 [1; 4] keeps the CSP invariant (i.e. R (R i ) = R i, 8i 2 [1; 4]). Thus, it is a symmetry of the CSP. Denition 5. Two domain values b i and c i for a CSP variable v i 2 V are syntactically symmetrical (notation b i c i ) if there exists a syntactical symmetry of the CSP P such that (b i ) = c i. Remark. The relation () is a relation of e- quivalence. In the previous example domain values a 1 and b 1 of the variable v 1 are syntactically symmetrical. Denition 6. A set fa 1 ; ;... ; 1 a2 an g of domain values form a cycle of symmetry in 1 1 P, if there exists a syntactical symmetry of P such that (a 1 1) = a 2 ; 1 1) = (a2 a ;... ; ) = a n ; 1 (an1 (an 1 1 1) = a 1 1 v Example. The sets of values fa i ; b i ; c i g, i 2 [1; 4] of the previous example forme four cycles of symmetry. All values in a cycle of symmetry are symmetrical two by two. Therefore, our method of search of symmetry will process a symmetry which gives for each domain, classes (cl(d i ) denotes the class of d i ) of values which are symmetrical together. Each classe will be identi- ed by a cycle of symmetry. Before, describing the search method of symmetry, we will prove that syntactical symmetry is a sucient condition for semantic symmetry. Theorem 7. If b i and c i are two syntactical symmetrical values of a CSP variable v i 2 V (b i c i ) then b i and c i are semantic symmetrical values for all solutions of the CSP (b i ' c i ). Proof. Cf. ([1]). Remark. Syntactical symmetrical values are also semantic symmetrical values. Symmetry expresses an important property that we use to make prune the search tree. Indeed if d i participates in no soliution of the CSP P and d i d i, then d i will participate in no solution too. Thus, we prune the sub-tree which corresponds to its assignment. Therefore, if there are n symmetrical domain values in cl(d), then we can cut n1 branches in the search tree if one of the domain values has already been identied that it paticipates in no solutions. See that neighborhood interchangeability is a very particular syntactical symmetry which permuts the interchangeable values and still identity for the other values. Such symmetries can not exists frequentlly. Our approache is more general and will get more use. Bellow we give the search method for syntactical symmetry.

5 .1 Search method for symmetry To be syntactically symmetrical, values need to satisfy some necessary conditions: Proposition 8. Let Rij (d i ) be the number of occurences of the value d i 2 D i in the relation R ij and tuples(r di ) ij the set of tuples of R ij in which d i appears, then to be syntactically symmetrical, values b i and c i must satisfy the following conditions: 1. Rij (b i ) = Rij (c i ), 8R ij 2 R; 2. for each d j 2 tuples(r bi ij ), 9 d j 2 tuples(r ci ij ) such that Rij (d j ) = Rij ( d j ), 8R ij 2 R. Proof. Cf. ([1]). The search method consits in two steps: (I) to partition each domain w.r.t the previous necessary conditions into primary classes of values which will be condidates for symmetry. (II) process a permutation from the primary classes which keeps the CSP invariant. We develope the step (II) which will give the complexity of the search method. procedure symmetry(d i 2 D) Repeat for each R ij 2 R: Repeat for each d i 2 D i, such that d i; d j 2 tuples(r ij): choose (d i) 2 cl(d i) and (d j) 2 cl(d j), such that (d i); (d j) 2 tuples(r ij) Fig.. The search symmetry algorithm The classes of symmetrical values are the dierent sycles of. A complexity bound for this algorithm can be found by assigning a worst case bound to each repeat loop. Given m relations, at most a values in each domain variable, we have the bound (the factors correspond to the repeat loops and the choose operation in topdown order): O(m a a 2 ) = O(m:a ). Bellow we show how several methods can be augmented with the advantage of symmetry. 4 Adaptation of various Constraints Propagation Algorithms Now we are in the position to show how these domain symmetrical values can be used to increase eciency of various existing algorithms. We give a few modications of the key procedures and show the advantages of the use of symmetry techniques for certain problem types. We focus on binary CSPs. 4.1 Constraint ltering algorithms The critical and most time consuming task in network consistency procedures is to check if all values of a particular variable domain can potentially be a member of a solution. These checks are done repetitively for singular variables w.r.t singular constrains. In the case of binary constraints, the procedure revise(d i,d j ) is usually used. It removes all values of D i for which no value of the domain D j can be found such that the binary constraint c ij between variables v i and v j is satised. It is abvious that the worst-case complexity of revise is O(a 2 ) where a is the maximum domain size. The procedure revise is applied on dierent constraints seperatelly, then symmetrical domain values must be computed w:r:t a given constraint c. The main idea is that domain values can be symmetrical w:r:t a constraint c, but not symmetrical w:r:t other constraints. So it is important to caracterize symmetrical values for each constraint of the network independently. We use the expression cl(d) v c (d is a domain value of the CSP variable v 2 var(c)) to denote the equivalence class of symmetrical values w:r:t to the constraint c in which d appears; formally: cl(d) v c =fd 2 D v : d dg. Figure 4 shows the procedure revise augmented by the advantage of symmetry.

6 procedure revise SV (var D i:domain,d j:domain) begin 4 i = fg repeat x := an element of D i 4 j = D j repeat y := an element of 4 j if x; y 2 tuples(r ij) then begin end 4 i := 4 i S fcl(x) v i c ij 4 j =f g end else 4 j := 4 j-fcl(y) v j until(4 j =f g) D i := D i fcl(x) v i until (D i =f g) D i := 4 i Fig.4. The revise SV c ij g algorithm. c ij g \ D ig The main dierence between the classical revise and revise SV is that the former checks in the worst case all tuples D i 2 D j and the later treats groups of symmetrical values e- qually. A symmetry dened on a constraint c partionnes the domain D i into subsets of domain values which are symmetrical together. If 5 v c is the set of symmetrical subsets domain values of the variable v 2 var(c), w:r:t the constraint c, if we assume that the sets 5c v for all constraint c and all variables v 2 var(c) are of size a (1 a a), then a worst case bound of the algorithm revise SV is O(a 2 ). 4.2 Backtrack search In the following, we want to envolve a tree search scheme where symmetrical search branches are recognized by use of symmetrical values. The algorithm is basically the same as classical backtrack tree search as discribed, for instance in ( Fox and Nadel [5]). But rst we have to give some notations we need for the development of the search procedure. Each output of a traditional backtrack procedure is an assignment tuple representing a solution for the given CSP. Because we want to handle groups of symmetrical values, we have to modify the form of the output. Instead of single assignment values, sets are used. As it was done in ([9]), assignment tuples are chifted to assignment bundles. Denition 9 Assignment Bundle. Let V be the set of n variables of the CSP P. An n-tuple 4 where the ith element (1 i n) is a non-vacuous subset of the domain D i is called an assignment bundle. Denition 1 Solution Bundle. Let sol(p) be the set of all solution of the CSP P. An assignment bundle 4 = f4 1 ;... ; 4 n g on the variables V of the CSP is said to be a solution bundle, if and only if n sol(p). Solutions bundle represent then groups of paths throught the search tree, which are solutions of the CSP. The terms of local and global consistency (see, for instance Dechter[4]) can be extended to assignment bundles. Denition 11. { An assignment bundle 4 p on the variables V p V is said to be locally consistent, if every assignment tuple extractable from 4 p is locally 4, consitent; { An assignment bundle 4 p on the variable V p V is said to be globally consistent, if there exists an extention assignment bundle 4 e on the variables (V V p ) such that 4 p [ 4 e is a solution bundle; { An assignment bundle 4 p is said to be inconsistent, if every assignment tuple extractable from 4 p is inconsistent (i.e., no tuple in 4 p can be extended to a solution). Now we modify the classical backtrack search such that for each pass a bundle assignment is computed. Solutions bundle regroup 4 I.e., all the constraints of the subnetwork de- ned by the variables V p are satised.

7 sets of symmetrical solutions. The following theorem gives the fundamental basis for the utilisation of symmetrical values. Theorem 12. Let 4 p be an assignment bundle on the variables V P V which is either globally consistent or inconsistent. Let v be a variable of V V p, v D v and C k all binary constraints from v to variables of (V V p ), such that the two following two conditions hold : will test both interchangeability and symmetry and compare them on two kind of problems: (I) randomlly generated CSP's, we use the same test model as proposed in Freuder ([8]). (II) the pigeon-hole problem which is known to be hard, is solved using symmetries with a linear complexity, however interchangeability get no use for this problem p + v is locally consistent; 2. 8d 1 ; d 2 2 v : 8c 2 C k ; d 1 d 2. Then 4 p + v is either globally consistent or inconsistent. Proof. Cf. ([1]) Random CSP's are characterized by the following four parameters: (1) n, the number of procedure backtrack SV (k:integer,b:assign-bundle); variables. (2) a, the maximum domain size. () begin t, the constraint tightness which is the fraction revise SV (D k; D p), for 1 p < k; of forbidden tuples to the number of possible for do some kind of look ahead ltringg d k := D k; repeat tuples. (4) the constraint density which is a number between and 1 given by d, indicates the fraction of additional constraints. x := an element of D k; C f := all constraints on v k to future variables; B[k] := ( cl(x) v k c2c f c ) \ d k; d k := d k B[k] if k = n then write(b) else backtracking SV (k + 1; B); until (d k = fg); 5.2 Results end. Fig.5. The backtrack algorithm. The advantageous behavior of the procedure backtracking SV is that symmetrical search branches are bundled and visited once. If a dead-end occurs, all the partial assignment extractable frome the derived assignment bundle are proven to be coniting. 5 experiments Now we want to invistigate the indicated performance improvement of our augmented search technique by experimental analysis. We 5.1 The experiment model Three forward-checking search procedures are compared: (1) (F C), the classical forwardchecking. (2) (F C N I), forward-checking with the advantage of neighborhood interchangeability seen as particular syntactical symmetry. () (F C SV ), the instance of the search scheme backtracking SV (see, gure 5) where forward-cheking ltring is used. The indicator of the complexity is the number of checks. Of cours, the checks needed for the computation of neighborhood interchangeability resp. symmetry are added to the run time checks. The samples of each test are randomly generated CSP's.

8 14 12 FC 1 FC-NI 8 FC-SV FC-SV Fig.6.Symmetry eects w.r.t the number of variables It can be seen in gure 6 that the eect of both symmetry and interchangeability grows if the problem increase. The variable size steps from 6 to 1, a is xed on 5, t and d are from the interval [.1-.4] (the protable ranges for the use of interchangeability as claimed in [8]). It can also be seen that F C SV denitily beats F C N I at these problems type FC FC-NI FC-SV Fig.7. FC and FC-NI eects on Pigeon-hole problem. Figure 8 shows that the complexity of F C SV for pigeon-hole problem seems to be linear, whereas both F C and F C N I (gure 7) cannot solve the problem when the number of pigeons is greater than eight, their complexities become quickly exponentiel when the number of pigeons is greater then 8. Thus, neighborhood interchangeability get no use for this problem. Fig.8. Symmetry eects on pigeon-hole problems. 6 Conclusion We have developed the formal cocept of symmetry in constraint satisfaction problems, then various constraintes satisfaction algorithmes can be adapted to exploit such information. The principe of interchangebility is shown to be a particular case of symmetry. Further investigation will consist to extend symmetry to domain values of dierent variables and try to identify certain type of C- SP's for which such symmetries get more use. References 1. B. Benhamou. Study of symmetry in constraint satisfaction problems. Technical Report 1, Universite de provence, B. Benhamou and L. Sais. Tractability through symmetries in propositional calculus. Journal of Automated Reasoning (JAR), to a- pear.. B. Benhamou and L. Sais. Theoretical s- tudy of symmetries in propositional calculus and application. Eleventh International Conference on Automated Deduction, Saratoga Springs,NY, USA, R. Dechter. From local to global consistency. Articial Intelligence, 55, pages 87{17, 1992.

9 5. M. Fox and B. Nadel. Constraint satisfaction directed reasoning. Tutorials of IJCAI-89, E. Freuder. Backtrack-free and backtrack bounded search. In Kanal, Laveen and Kumar, Vipin, editors 1988, Search in Articial Intelligence. Springer-Verlag, New York., E. Freuder. Eliminating interchangeable values in constraints satisfaction problems. Proc AAAI-91, pages 227{2, E. Freuder and W. Benson. Interchangeability preprocessing can improve forward checking search. In proc. ECAI, A. Haselbock. Exploiting interchangeability in constraint satisfaction problems. In Proceedings of IJCAI, pages 282{287, V. Kumar. Algorithms for constraints satisfaction problems. AI Magazine, pages 2{44, A. Mackworth. Consistency in networks of relations. Articial Intelligence 8, pages 99{ 118, D. Rossi and Petrie. On the equivalence of constraint satisfaction problems. Technical report, MCC Technical Report ACT-AI MCC, Austin, Texas 78759, D. Waltz. Understanding line drawings of scenes with shadows. In Winston, P.H., editor, the Psychology of Computer Vision. Mc- Graw Hill, Cambridge, MA, This article was processed using the LaT E X macro package with LLNCS style

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009 Symmetries in CSP Elena Sherman UNL, CSE April 18, 2009 Table of contents Why Symmetry? Symmetry Examples Adding symmetry-breaking global contraints Search space modification Heuristics modification Historical

More information

Statistical Analysis of Backtracking on. Inconsistent CSPs? Irina Rish and Daniel Frost.

Statistical Analysis of Backtracking on. Inconsistent CSPs? Irina Rish and Daniel Frost. Statistical Analysis of Backtracking on Inconsistent CSPs Irina Rish and Daniel Frost Department of Information and Computer Science University of California, Irvine, CA 92697-3425 firinar,frostg@ics.uci.edu

More information

A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs

A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs 2008 20th IEEE International Conference on Tools with Artificial Intelligence A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs Philippe Jégou Samba

More information

The Extendable-Triple Property: a new CSP Tractable Class beyond BTP

The Extendable-Triple Property: a new CSP Tractable Class beyond BTP The Extendable-Triple Property: a new CSP Tractable Class beyond BTP Philippe Jégou and Cyril Terrioux Aix-Marseille Université, CNRS LSIS UMR 7296 Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex

More information

Generalized Micro-Structures for Non-Binary CSP

Generalized Micro-Structures for Non-Binary CSP Generalized Micro-Structures for Non-Binary CSP Achref El Mouelhi LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France) achref.elmouelhi@lsis.org

More information

Symmetry Definitions for Constraint Satisfaction Problems

Symmetry Definitions for Constraint Satisfaction Problems Symmetry Definitions for Constraint Satisfaction Problems David Cohen 1, Peter Jeavons 2, Christopher Jefferson 3, Karen E. Petrie 4, and Barbara M. Smith 4 1 Department of Computer Science, Royal Holloway,

More information

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT

More information

Rina Dechter and Irina Rish. Information and Computer Science. University of California, Irvine.

Rina Dechter and Irina Rish. Information and Computer Science. University of California, Irvine. Directional Resolution: The Davis-Putnam Procedure, Revisited 3 Rina Dechter and Irina Rish Information and Computer Science University of California, Irvine dechter@ics.uci.edu, irinar@ics.uci.edu Abstract

More information

Dynamic symmetry detection and elimination for the satisfiability problem

Dynamic symmetry detection and elimination for the satisfiability problem Dynamic symmetry detection and elimination for the satisfiability problem Belaïd Benhamou and Tarek Nabhani and Richard Ostrowski and Mohamed Réda Saïdi Laboratoire des Sciences de l Information et des

More information

Splitting a Default Theory. Hudson Turner. University of Texas at Austin.

Splitting a Default Theory. Hudson Turner. University of Texas at Austin. Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that

More information

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,

More information

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus, Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer

More information

Exploiting a Theory of Phase Transitions in Three-Satisability. Problems. David M. Pennock and Quentin F. Stout. University ofmichigan

Exploiting a Theory of Phase Transitions in Three-Satisability. Problems. David M. Pennock and Quentin F. Stout. University ofmichigan Exploiting a Theory of Phase Transitions in Three-Satisability Problems David M. Pennock and Quentin F. Stout Electrical Engineering and Computer Science Department University ofmichigan Ann Arbor, MI

More information

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu

More information

Constraint Satisfaction 101

Constraint Satisfaction 101 Constraint Satisfaction 101 Berthe Y. Choueiry (Shu-we-ri) Nov 14, 2006 Constraint Satisfaction 101 1 Constraint Processing Constraint Satisfaction Computational problem Constraint Satisfaction Problem

More information

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,

More information

Analyzing a Heuristic Strategy. for Constraint-Satisfaction and Scheduling. Mark D. Johnston and Steven Minton. Abstract

Analyzing a Heuristic Strategy. for Constraint-Satisfaction and Scheduling. Mark D. Johnston and Steven Minton. Abstract Analyzing a Heuristic Strategy for Constraint-Satisfaction and Scheduling Mark D. Johnston and Steven Minton Abstract This paper describes a simple heuristic approach to solving large-scale constraint

More information

problems from this class. For each combination algorithm C, and for each actual size s, we can dene the worst-case computation time T (C; s) of the co

problems from this class. For each combination algorithm C, and for each actual size s, we can dene the worst-case computation time T (C; s) of the co From Planning to Searching for the Shortest Plan: An Optimal Transition Le Chi Tuan, Joel Galloway Charanjiv Sachar, Vladik Kreinovich Department of Computer Science University of Texas at El Paso El Paso,

More information

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from

More information

Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer

Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer Science The Weizmann Institute of Science Prof. Moshe

More information

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and An average case analysis of a dierential attack on a class of SP-networks Luke O'Connor Distributed Systems Technology Centre, and Information Security Research Center, QUT Brisbane, Australia Abstract

More information

Constraint-based Optimal Testing Using DNNF Graphs

Constraint-based Optimal Testing Using DNNF Graphs Constraint-based Optimal Testing Using DNNF Graphs Anika Schumann 1, Martin Sachenbacher 2, and Jinbo Huang 3 1 Cork Constraint Computation Centre, University College Cork, Ireland 2 Institut für Informatik,

More information

A Hybrid Tractable Class for Non-Binary CSPs

A Hybrid Tractable Class for Non-Binary CSPs A Hybrid Tractable Class for Non-Binary CSPs Achref El Mouelhi Philippe Jégou Cyril Terrioux LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France)

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Constraint Satisfaction Vibhav Gogate The University of Texas at Dallas Some material courtesy of Rina Dechter, Alex Ihler and Stuart Russell Constraint Satisfaction Problems The

More information

STGs may contain redundant states, i.e. states whose. State minimization is the transformation of a given

STGs may contain redundant states, i.e. states whose. State minimization is the transformation of a given Completely Specied Machines STGs may contain redundant states, i.e. states whose function can be accomplished by other states. State minimization is the transformation of a given machine into an equivalent

More information

Weak ω-automata. Shaked Flur

Weak ω-automata. Shaked Flur Weak ω-automata Shaked Flur Weak ω-automata Research Thesis Submitted in partial fulllment of the requirements for the degree of Master of Science in Computer Science Shaked Flur Submitted to the Senate

More information

Introduction to Arti Intelligence

Introduction to Arti Intelligence Introduction to Arti Intelligence cial Lecture 4: Constraint satisfaction problems 1 / 48 Constraint satisfaction problems: Today Exploiting the representation of a state to accelerate search. Backtracking.

More information

The Constrainedness Knife-Edge. Toby Walsh. APES Group. Glasgow, Scotland.

The Constrainedness Knife-Edge. Toby Walsh. APES Group. Glasgow, Scotland. Abstract A general rule of thumb is to tackle the hardest part of a search problem rst. Many heuristics therefore try to branch on the most constrained variable. To test their eectiveness at this, we measure

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

Making Bound Consistency as Effective as Arc Consistency

Making Bound Consistency as Effective as Arc Consistency Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI-09) Making Bound Consistency as Effective as Arc Consistency Christian Bessiere LIRMM-CNRS U. Montpellier,

More information

Transformation Rules for Locally Stratied Constraint Logic Programs

Transformation Rules for Locally Stratied Constraint Logic Programs Transformation Rules for Locally Stratied Constraint Logic Programs Fabio Fioravanti 1, Alberto Pettorossi 2, Maurizio Proietti 3 (1) Dipartimento di Informatica, Universit dell'aquila, L'Aquila, Italy

More information

constraints with more parsimony and makes the encodings more economical, either by reducing the number of clauses or variables or both. [Kautz & Selma

constraints with more parsimony and makes the encodings more economical, either by reducing the number of clauses or variables or both. [Kautz & Selma Frugal Propositional Encodings for Planning Amol D. Mali, Subbarao Kambhampati Dept. of computer science & Engg. Arizona state university, Tempe, AZ 8587-5406 famol.mali, raog@.asu.edu Abstract Casting

More information

Chapter 6 Constraint Satisfaction Problems

Chapter 6 Constraint Satisfaction Problems Chapter 6 Constraint Satisfaction Problems CS5811 - Artificial Intelligence Nilufer Onder Department of Computer Science Michigan Technological University Outline CSP problem definition Backtracking search

More information

Min-Max Message Passing and Local Consistency in Constraint Networks

Min-Max Message Passing and Local Consistency in Constraint Networks Min-Max Message Passing and Local Consistency in Constraint Networks Hong Xu, T. K. Satish Kumar, and Sven Koenig University of Southern California, Los Angeles, CA 90089, USA hongx@usc.edu tkskwork@gmail.com

More information

Counting and Constructing Minimal Spanning Trees. Perrin Wright. Department of Mathematics. Florida State University. Tallahassee, FL

Counting and Constructing Minimal Spanning Trees. Perrin Wright. Department of Mathematics. Florida State University. Tallahassee, FL Counting and Constructing Minimal Spanning Trees Perrin Wright Department of Mathematics Florida State University Tallahassee, FL 32306-3027 Abstract. We revisit the minimal spanning tree problem in order

More information

Consistency algorithms

Consistency algorithms Consistency algorithms Chapter SQ 00 rc-consistency X, Y, Z, T X Y Y = Z T Z X T X,, Y,,,,,, T = Z SQ 00 rc-consistency X, Y, Z, T X Y Y = Z T Z X T X T Y Z = SQ 00 rc-consistency Sound < < Incomplete

More information

Abstract. This paper discusses polynomial-time reductions from Hamiltonian Circuit (HC),

Abstract. This paper discusses polynomial-time reductions from Hamiltonian Circuit (HC), SAT-Variable Complexity of Hard Combinatorial Problems Kazuo Iwama and Shuichi Miyazaki Department of Computer Science and Communication Engineering Kyushu University, Hakozaki, Higashi-ku, Fukuoka 812,

More information

Interpolation theorems, lower bounds for proof. systems, and independence results for bounded. arithmetic. Jan Krajcek

Interpolation theorems, lower bounds for proof. systems, and independence results for bounded. arithmetic. Jan Krajcek Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic Jan Krajcek Mathematical Institute of the Academy of Sciences Zitna 25, Praha 1, 115 67, Czech Republic

More information

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

Behavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France Behavioural theories and the proof of behavioural properties Michel Bidoit a and Rolf Hennicker b b a LIENS, C.N.R.S. U.R.A. 1327 & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France

More information

Arguing and Explaining Classifications

Arguing and Explaining Classifications Arguing and Explaining Classifications Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Mathieu Serrurier IRIT CNRS 118, route de Narbonne 31062, Toulouse, France serrurier@irit.fr

More information

0 o 1 i B C D 0/1 0/ /1

0 o 1 i B C D 0/1 0/ /1 A Comparison of Dominance Mechanisms and Simple Mutation on Non-Stationary Problems Jonathan Lewis,? Emma Hart, Graeme Ritchie Department of Articial Intelligence, University of Edinburgh, Edinburgh EH

More information

Branching Rules for Minimum Congestion Multi- Commodity Flow Problems

Branching Rules for Minimum Congestion Multi- Commodity Flow Problems Clemson University TigerPrints All Theses Theses 8-2012 Branching Rules for Minimum Congestion Multi- Commodity Flow Problems Cameron Megaw Clemson University, cmegaw@clemson.edu Follow this and additional

More information

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université

More information

Transposition Tables for Constraint Satisfaction

Transposition Tables for Constraint Satisfaction Transposition Tables for Constraint Satisfaction Christophe Lecoutre and Lakhdar Sais and Sébastien Tabary and Vincent Vidal CRIL CNRS FRE 2499 Université d Artois Lens, France {lecoutre, sais, tabary,

More information

Three-dimensional Stable Matching Problems. Cheng Ng and Daniel S. Hirschberg. Department of Information and Computer Science

Three-dimensional Stable Matching Problems. Cheng Ng and Daniel S. Hirschberg. Department of Information and Computer Science Three-dimensional Stable Matching Problems Cheng Ng and Daniel S Hirschberg Department of Information and Computer Science University of California, Irvine Irvine, CA 92717 Abstract The stable marriage

More information

Computation of Floating Mode Delay in Combinational Circuits: Theory and Algorithms. Kurt Keutzer. Synopsys. Abstract

Computation of Floating Mode Delay in Combinational Circuits: Theory and Algorithms. Kurt Keutzer. Synopsys. Abstract Computation of Floating Mode Delay in Combinational Circuits: Theory and Algorithms Srinivas Devadas MIT Cambridge, MA Kurt Keutzer Synopsys Mountain View, CA Sharad Malik Princeton University Princeton,

More information

1 I A Q E B A I E Q 1 A ; E Q A I A (2) A : (3) A : (4)

1 I A Q E B A I E Q 1 A ; E Q A I A (2) A : (3) A : (4) Latin Squares Denition and examples Denition. (Latin Square) An n n Latin square, or a latin square of order n, is a square array with n symbols arranged so that each symbol appears just once in each row

More information

[3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional

[3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional - 14 - [3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional expert systems. Proceedings of the 8th National Conference on Articial Intelligence (AAAI-9), 199, 671{676.

More information

Updating Disjunctive Databases via Model. Trees. John Grant. Computer and Information Sciences, Towson State University.

Updating Disjunctive Databases via Model. Trees. John Grant. Computer and Information Sciences, Towson State University. Updating Disjunctive Databases via Model Trees John Grant Computer and Information Sciences, Towson State University Jaros law Gryz Computer Science Department, University of Maryland, College Park Jack

More information

Applications of the Situation Calculus To Formalizing. Control and Strategic Information: The Prolog Cut Operator. Fangzhen Lin

Applications of the Situation Calculus To Formalizing. Control and Strategic Information: The Prolog Cut Operator. Fangzhen Lin Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (in@csusthk) Department of Computer Science The Hong Kong University of Science

More information

Symmetries of Symmetry Breaking Constraints

Symmetries of Symmetry Breaking Constraints Symmetries of Symmetry Breaking Constraints George Katsirelos NICTA, Sydney, Australia george.katsirelos@nicta.com.au Toby Walsh NICTA and UNSW, Sydney, Australia toby.walsh@nicta.com.au Abstract Symmetry

More information

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd

signicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd On the Relationship Between CWA, Minimal Model and Minimal Herbrand Model Semantics Michael Gelfond Halina Przymusinska Teodor Przymusinski March 3, 1995 Abstract The purpose of this paper is to compare

More information

Symmetry and Consistency

Symmetry and Consistency Symmetry and Consistency Ian P. Gent 1, Tom Kelsey 1, Steve Linton 1, Colva Roney-Dougal 1 1 School of Computer Science, University of St Andrews, St Andrews, Fife, KY16 9SX, UK {ipg,tom,sal,colva}@dcs.st-and.ac.uk

More information

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de

More information

Consistency algorithms. Chapter 3

Consistency algorithms. Chapter 3 Consistency algorithms Chapter Fall 00 Consistency methods pproximation of inference: rc, path and i-consistecy Methods that transform the original network into tighter and tighter representations Fall

More information

Boolean Algebra and Propositional Logic

Boolean Algebra and Propositional Logic Boolean Algebra and Propositional Logic Takahiro Kato September 10, 2015 ABSTRACT. This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a

More information

Abstract The paper presents an algorithm called directional resolution, avariation on the

Abstract The paper presents an algorithm called directional resolution, avariation on the Directional Resolution: The Davis-Putnam Procedure, Revisited 3 Rina Dechter and Irina Rish Information and Computer Science University of California, Irvine dechter@ics.uci.edu, irinar@ics.uci.edu Abstract

More information

Predicates and Predicate Transformers for. Systems 1. Ratnesh Kumar. Department of Electrical Engineering. University of Kentucky

Predicates and Predicate Transformers for. Systems 1. Ratnesh Kumar. Department of Electrical Engineering. University of Kentucky Predicates and Predicate Transformers for Supervisory Control of Discrete Event Dynamical Systems 1 Ratnesh Kumar Department of Electrical Engineering University of Kentucy Lexington, KY 40506-0046 Vijay

More information

Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni

Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Universiteit Amsterdam, De Boelelaan 1081a, 1081 HV Amsterdam,

More information

On a generalization of extended resolution

On a generalization of extended resolution Discrete Applied Mathematics 96 97 (1999) 149 176 On a generalization of extended resolution O. Kullmann Johann Wolfgang Goethe-Universitat, Fachbereich Mathematik D-60054 Frankfurt, Germany Received 1

More information

Lecture 14 - P v.s. NP 1

Lecture 14 - P v.s. NP 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

Cristani the relation EQ, as dened by Randell, Cui and Cohn (1989), and analogously by Egenhofer and Franzosa (1991), becomes identity under the uniqu

Cristani the relation EQ, as dened by Randell, Cui and Cohn (1989), and analogously by Egenhofer and Franzosa (1991), becomes identity under the uniqu Journal of Articial Intelligence Research 11 (1999) 361-390 Submitted 6/99; published 11/99 The Complexity of Reasoning about Spatial Congruence Matteo Cristani Dipartimento Scientico e Tecnologico, Universita

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Steven Minton 1 Mark D. Johnston 2 Andrew B. Philips 1 Philip Laird 3. NASA Ames Research Center 3700 San Martin Drive, AI Research Branch

Steven Minton 1 Mark D. Johnston 2 Andrew B. Philips 1 Philip Laird 3. NASA Ames Research Center 3700 San Martin Drive, AI Research Branch Minimizing Conicts: A Heuristic Repair Method for Constraint-Satisfaction and Scheduling Problems Steven Minton 1 Mark D. Johnston 2 Andrew B. Philips 1 Philip Laird 3 1 Sterling Federal Systems 2 Space

More information

Minimal enumerations of subsets of a nite set and the middle level problem

Minimal enumerations of subsets of a nite set and the middle level problem Discrete Applied Mathematics 114 (2001) 109 114 Minimal enumerations of subsets of a nite set and the middle level problem A.A. Evdokimov, A.L. Perezhogin 1 Sobolev Institute of Mathematics, Novosibirsk

More information

The following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of

The following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of An algorithm for computing the Weierstrass normal form Mark van Hoeij Department of mathematics University of Nijmegen 6525 ED Nijmegen The Netherlands e-mail: hoeij@sci.kun.nl April 9, 1995 Abstract This

More information

(1.) For any subset P S we denote by L(P ) the abelian group of integral relations between elements of P, i.e. L(P ) := ker Z P! span Z P S S : For ea

(1.) For any subset P S we denote by L(P ) the abelian group of integral relations between elements of P, i.e. L(P ) := ker Z P! span Z P S S : For ea Torsion of dierentials on toric varieties Klaus Altmann Institut fur reine Mathematik, Humboldt-Universitat zu Berlin Ziegelstr. 13a, D-10099 Berlin, Germany. E-mail: altmann@mathematik.hu-berlin.de Abstract

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Temporal Reasoning with Constraints. on Fluents and Events 3.

Temporal Reasoning with Constraints. on Fluents and Events 3. Temporal Reasoning with Constraints on Fluents and Events 3 Eddie Schwalb, Kalev Kask, Rina Dechter Department of Information and Computer Science University of California, Irvine CA 92717 feschwalb,kkask,dechterg@ics.uci.edu

More information

Lean clause-sets: Generalizations of minimally. unsatisable clause-sets. Oliver Kullmann. University of Toronto. Toronto, Ontario M5S 3G4

Lean clause-sets: Generalizations of minimally. unsatisable clause-sets. Oliver Kullmann. University of Toronto. Toronto, Ontario M5S 3G4 Lean clause-sets: Generalizations of minimally unsatisable clause-sets Oliver Kullmann Department of Computer Science University of Toronto Toronto, Ontario M5S 3G4 e-mail: kullmann@cs.toronto.edu http://www.cs.utoronto.ca/kullmann/

More information

the subset partial order Paul Pritchard Technical Report CIT School of Computing and Information Technology

the subset partial order Paul Pritchard Technical Report CIT School of Computing and Information Technology A simple sub-quadratic algorithm for computing the subset partial order Paul Pritchard P.Pritchard@cit.gu.edu.au Technical Report CIT-95-04 School of Computing and Information Technology Grith University

More information

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l viii CONTENTS ABSTRACT IN ENGLISH ABSTRACT IN TAMIL LIST OF TABLES LIST OF FIGURES iii v ix x 1 INTRODUCTION 1 1.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 Preliminaries

More information

Combining Qualitative and Quantitative. Itay Meiri y. University of California. Abstract

Combining Qualitative and Quantitative. Itay Meiri y. University of California. Abstract Combining Qualitative and Quantitative Constraints in Temporal Reasoning Itay Meiri y Cognitive Systems Laboratory Computer Science Department University of California Los Angeles, CA 90024 itay@cs.ucla.edu

More information

Reasoning with Deterministic and Probabilistic graphical models Class 2: Inference in Constraint Networks Rina Dechter

Reasoning with Deterministic and Probabilistic graphical models Class 2: Inference in Constraint Networks Rina Dechter Reasoning with Deterministic and Probabilistic graphical models Class 2: Inference in Constraint Networks Rina Dechter Road Map n Graphical models n Constraint networks Model n Inference n Search n Probabilistic

More information

Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective. German Research Center for Articial Intelligence (DFKI)

Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective. German Research Center for Articial Intelligence (DFKI) Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective Bernhard Nebel Jana Koehler German Research Center for Articial Intelligence (DFKI) Stuhlsatzenhausweg 3, D-6623 Saarbrucken,

More information

The size of decision table can be understood in terms of both cardinality of A, denoted by card (A), and the number of equivalence classes of IND (A),

The size of decision table can be understood in terms of both cardinality of A, denoted by card (A), and the number of equivalence classes of IND (A), Attribute Set Decomposition of Decision Tables Dominik Slezak Warsaw University Banacha 2, 02-097 Warsaw Phone: +48 (22) 658-34-49 Fax: +48 (22) 658-34-48 Email: slezak@alfa.mimuw.edu.pl ABSTRACT: Approach

More information

Boolean Algebra and Propositional Logic

Boolean Algebra and Propositional Logic Boolean Algebra and Propositional Logic Takahiro Kato June 23, 2015 This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a more direct connection

More information

same literal in a formula), and useful equivalence-preserving operations based on anti-links are

same literal in a formula), and useful equivalence-preserving operations based on anti-links are Fast Subsumption Checks Using Anti-Links Anavai Ramesh y Intel Corporation, MS CH6-418, 5000 W. Chandler Blvd., Chandler, AZ 85226. Email: agramesh@sedona.intel.com Bernhard Beckert and Reiner Hahnle University

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

AUTOMATED REASONING. Agostino Dovier. Udine, October 2, Università di Udine CLPLAB

AUTOMATED REASONING. Agostino Dovier. Udine, October 2, Università di Udine CLPLAB AUTOMATED REASONING Agostino Dovier Università di Udine CLPLAB Udine, October 2, 2017 AGOSTINO DOVIER (CLPLAB) AUTOMATED REASONING UDINE, OCTOBER 2, 2017 1 / 28 COURSE PLACEMENT International Master Degree

More information

ground state degeneracy ground state energy

ground state degeneracy ground state energy Searching Ground States in Ising Spin Glass Systems Steven Homer Computer Science Department Boston University Boston, MA 02215 Marcus Peinado German National Research Center for Information Technology

More information

Static and Dynamic Structural Symmetry Breaking

Static and Dynamic Structural Symmetry Breaking Static and Dynamic Structural Symmetry Breaking Pierre Flener 1, Justin Pearson 1, Meinolf Sellmann 2, and Pascal Van Hentenryck 2 1 Dept of Information Technology, Uppsala University, Box 337, 751 05

More information

2 SUMMARISING APPROXIMATE ENTAILMENT In this section we will summarise the work in (Schaerf and Cadoli 995), which denes the approximate entailment re

2 SUMMARISING APPROXIMATE ENTAILMENT In this section we will summarise the work in (Schaerf and Cadoli 995), which denes the approximate entailment re Computing approximate diagnoses by using approximate entailment Annette ten Teije SWI University of Amsterdam The Netherlands annette@swi.psy.uva.nl Abstract The most widely accepted models of diagnostic

More information

The matrix approach for abstract argumentation frameworks

The matrix approach for abstract argumentation frameworks The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report RR- -2015-01- -FR February 2015 Abstract The matrices and the operation of dual interchange are introduced

More information

An exploration of matrix equilibration

An exploration of matrix equilibration An exploration of matrix equilibration Paul Liu Abstract We review three algorithms that scale the innity-norm of each row and column in a matrix to. The rst algorithm applies to unsymmetric matrices,

More information

of acceptance conditions (nite, looping and repeating) for the automata. It turns out,

of acceptance conditions (nite, looping and repeating) for the automata. It turns out, Reasoning about Innite Computations Moshe Y. Vardi y IBM Almaden Research Center Pierre Wolper z Universite de Liege Abstract We investigate extensions of temporal logic by connectives dened by nite automata

More information

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.

More information

Reformulation of capacitated facility location problems: How redundant information can help. Karen Aardal. Utrecht University. P.O.

Reformulation of capacitated facility location problems: How redundant information can help. Karen Aardal. Utrecht University. P.O. Reformulation of capacitated facility location problems: How redundant information can help Karen Aardal Department of Computer Science Utrecht University P.O. Box 80089 3508 TB Utrecht, The Netherlands

More information

ROYAL INSTITUTE OF TECHNOLOGY KUNGL TEKNISKA HÖGSKOLAN. Department of Signals, Sensors & Systems

ROYAL INSTITUTE OF TECHNOLOGY KUNGL TEKNISKA HÖGSKOLAN. Department of Signals, Sensors & Systems The Evil of Supereciency P. Stoica B. Ottersten To appear as a Fast Communication in Signal Processing IR-S3-SB-9633 ROYAL INSTITUTE OF TECHNOLOGY Department of Signals, Sensors & Systems Signal Processing

More information

2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s

2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s 1 THE LARGEST FIRST-ORDER-AXIOMATIZALE CARTESIAN CLOSED CATEGORY OF DOMAINS 1 June 1986 Carl A. Gunter Cambridge University Computer Laboratory, Cambridge C2 3QG, England Introduction The inspiration for

More information

Default Reasoning and Belief Revision: A Syntax-Independent Approach. (Extended Abstract) Department of Computer Science and Engineering

Default Reasoning and Belief Revision: A Syntax-Independent Approach. (Extended Abstract) Department of Computer Science and Engineering Default Reasoning and Belief Revision: A Syntax-Independent Approach (Extended Abstract) Dongmo Zhang 1;2, Zhaohui Zhu 1 and Shifu Chen 2 1 Department of Computer Science and Engineering Nanjing University

More information

A Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006

A Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006 A Z q -Fan theorem Frédéric Meunier December 11, 2006 Abstract In 1952, Ky Fan proved a combinatorial theorem generalizing the Borsuk-Ulam theorem stating that there is no Z 2-equivariant map from the

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset A Generalization of Shostak's Method for Combining Decision Procedures Clark W. Barrett, David L. Dill, and Aaron Stump Stanford University, Stanford, CA 94305, USA, http://verify.stanford.edu c Springer-Verlag

More information

Consistency restoration and explanations in dynamic CSPs Application to configuration

Consistency restoration and explanations in dynamic CSPs Application to configuration Artificial Intelligence 135 (2002) 199 234 Consistency restoration and explanations in dynamic CSPs Application to configuration Jérôme Amilhastre a, Hélène Fargier b,, Pierre Marquis c a Access Commerce,

More information

NORMALE SUPERIEURE. Département de Mathématiques et Informatique CNRS URA Black Box Cryptanalysis of Cryptographic.

NORMALE SUPERIEURE. Département de Mathématiques et Informatique CNRS URA Black Box Cryptanalysis of Cryptographic. E COLE NORMALE SUPERIEURE Black Box Cryptanalysis of Cryptographic Primitives Claus Peter SCHNORR Serge VAUDENAY LIENS - 95-28 Département de Mathématiques et Informatique CNRS URA 1327 Black Box Cryptanalysis

More information

Math 42, Discrete Mathematics

Math 42, Discrete Mathematics c Fall 2018 last updated 12/05/2018 at 15:47:21 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,

More information

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in

More information